Malware: computer virus, computer worm, Trojan horse
A computer virus affects a program, much like a virus affects cells in the body. It does what it was programmed to do: the computer cannot be started or it is no longer possible to change or save files or browser windows open automatically.
Worms spread themselves using a variety of methods. For example, a worm can exploit an email program and then independently send itself to all addresses in the address book.
Trojans initially look harmless and are hidden in a Word file, for example. When the file is opened, the Trojan can download additional malicious programs via the Internet.
What can malware do?
If malware gets into the computer system, they can, for example, spy on personal data and passwords. Some programs are also able to intercept and manipulate data traffic during online banking - those affected usually don't notice anything at first.
Adware ensures that the user is constantly shown pop-up windows with advertisements. Such programs usually come as unwanted appendages of free downloads. They're basically harmless, but they're annoying.
And then there is the ransomware or ransomware.
What is ransomware?
Ransomware refers to malicious programs that restrict or prevent victims from accessing data and systems, for example by encrypting all hard drives. The attackers then demand a ransom for decryption. The corresponding malware is usually sent in an email attachment with an incorrect sender.
According to the Federal Criminal Police Office, the most frequently imitated senders in 2021 were Microsoft, DHL, Amazon, Google and WhatsApp, but banks are also often imitated. If the user clicks on the email attachment, the malware installed is installed and attacks the computer - in the worst case, all stored data becomes unusable.
Protection against hacker attacks: antivirus programs
Antivirus programs work like a vaccination for the computer. They search incoming emails, network and data traffic or the security of websites. If the software detects a malware, it warns about it and often cleans it up at the same time. SWR multimedia expert Andreas Reinhard recommends that users of a Windows operating system definitely use an antivirus program. This should always be kept up to date - regular updates are absolutely necessary.
How good is Windows Defender?
For users who have a sound basic knowledge of online security, the “Windows Defender” program preinstalled on Windows computers is sufficient and offers good protection. For people with less knowledge and who tend to fall victim to hacker attacks more easily, an additional, external virus protection program may be recommended.
Source: SWR Marktcheck / Author: Stefanie Waldschmidt, Andreas Reinhardt
You might also be interested in: These search engines are available for children
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

